UCSMssp: Ubiquitous Computing Service Model Based on SPKI/SDSI and P2P

被引:0
|
作者
Sun, Daoqing [1 ]
Pu, Fang [1 ]
Cao, Qiying [1 ]
机构
[1] Donghua Univ, Coll Informat Sci & Technol, Shanghai 201620, Peoples R China
关键词
Peer-to-Peer; Security; Service Model; SPKI/SDSI; Ubiquitous Computing;
D O I
10.1109/WCICA.2008.4593373
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous computing systems typically have lots of security problems in the area of service supply. The service types and levels, the security delegation of services and the identity hiding of principal etc are all these unsolved problems. In this paper, UCSMssp, a new novel ubiquitous computing service model based on SPKI/SDSI and P2P is presented. SPKI-based authorization is exploited in UCSMssp to solve above problems in small-scale ubiquitous computing environments. The DHT and flooding or random walk technology of Peer-to-Peer overlay network over the Internet is expanded to solve the routing search in large-scale ubiquitous computing environments. The architecture of ubiquitous computing environment, the service authorization processes and the service supply processes etc of UCSMssp are described in the paper. The performance analysis shows that UCSMssp is a suitable security solution used in large-scale ubiquitous computing environments.
引用
收藏
页码:2822 / 2827
页数:6
相关论文
共 50 条
  • [1] UCIMssp:Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P
    孙道清
    蒲芳
    曹奇英
    JournalofDonghuaUniversity(EnglishEdition), 2008, 25 (04) : 475 - 483
  • [2] Ubiquitous computing service model based on SPKI/SDSI
    Sun, Daoqing
    Pan, Jing
    Cao, Qiying
    Li, Tong
    Yang, Fan
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 2218 - 2223
  • [3] UCSMdess: Ubiquitous computing service model based on D-S Evidence Theory and extended SPKI/SDSI
    Sun, Daoqing
    Lu, Yishu
    Cao, Qiying
    WSEAS: ADVANCES ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE, 2008, : 75 - +
  • [4] The coarse-grained computing P2P algorithm based on SPKI
    Ma, Yong
    Tian, Yumin
    ADVANCES IN NATURAL COMPUTATION, PT 2, 2006, 4222 : 394 - 401
  • [5] Secure Event Service using SPKI/SDSI Certificate in Ubiquitous
    Park, HeeMan
    Lee, YoungLok
    Lee, HyungHyo
    Noh, BongNam
    INTERNATIONAL ELECTRONIC CONFERENCE ON COMPUTER SCIENCE, 2008, 1060 : 250 - +
  • [6] Semantic based collaborative P2P in ubiquitous computing
    Politecnico di Bari, via Re David 200, I-70125 Bari, Italy
    不详
    Web Intell. Agent Syst., 2007, 4 (375-391):
  • [7] Semantic based collaborative P2P in ubiquitous computing
    Ruta, M
    Di Noia, T
    Di Sciascio, E
    Donini, FM
    Piscitelli, G
    2005 IEEE/WIC/ACM International Conference on Web Intelligence, Proceedings, 2005, : 143 - 149
  • [8] Ubiquitous Computing Identity Authentication Mechanism Based on D-S Evidence Theory and Extended SPKI/SDSI
    孙道清
    曹奇英
    Journal of Donghua University(English Edition), 2008, 25 (05) : 564 - 570
  • [9] Design and Implementation of an Efficient Search Mechanism based on the Hybrid P2P Model for Ubiquitous Computing Systems
    Inaba, T
    Okawa, T
    Murata, Y
    Takizawa, H
    Kobayashi, H
    INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET , PROCEEDINGS, 2006, : 45 - +
  • [10] Ubiquitous computing identity authentication mechanism based on D-S evidence theory and extended SPKI/SDSI
    College of Mathematics and Computer Science, Anhui Normal University, Wuhu, Anhui 241000, China
    不详
    Journal of Donghua University (English Edition), 2008, 25 (05) : 564 - 570